Logo
  • Home
  • Benefits
  • Partners & Clients
  • Contact Us
  • What’s new?
    • Security Advisory
    • Audio
    • Ports
    • Development Tools
    • Blog Listing
  • Home
  • Benefits
  • Partners & Clients
  • Contact Us
  • What’s new?
    • Security Advisory
    • Audio
    • Ports
    • Development Tools
    • Blog Listing

Security Advisory

  • bluekitchen / 15th December 2023

BLUFFS: Impersonating BR/EDR Devices Using Fixed Weak Session Encryption Key

Security Advisory
Over the years, the security mechanism used in BR/EDR (Classic) have evolved from Legacy Pairing over Secure Simple Pairing to the current Secure

Read More

  • bluekitchen / 10th December 2020

BLESA: GATT Client Vulnerabilities

Security Advisory
For Bluetooth Low Energy (BLE) connections, most application make use of the Generic Attribute Profile (GATT) profile. Access to data on the GATT

Read More

  • bluekitchen / 23rd October 2020

BLURtooth: BLUR Attacks on CTKD

Security Advisory
The Cross-transport Key Derivation (CTKD) between Bluetooth LE and Classic (BR/EDR) transports introduces various security issues depending on

Read More

  • bluekitchen / 20th October 2020

Method Confustion Attack on Bluetooth Pairing

Security Advisory
LE Secure Connections uses the Passkey entry method to prevent MITM attacks. However, the new ‘Method Confusion Attack’ shows that a

Read More

  • bluekitchen / 15th September 2020

BIAS: Bluetooth Impersonation AttackS

Security Advisory
A new Bluetooth security paper Bluetooth Impersonation AttackS (BIAS) shows how flaws in the Bluetooth spec can be used to perform a variant of

Read More

  • bluekitchen / 19th August 2019

KNOB: Key Negotiation of Bluetooth Attack

Security Advisory
The new KNOB attack exploits a flaw in the key negotiation protocol for classic connections and lets an attacker reduce the effective key length

Read More

  • bluekitchen / 29th November 2018

Low Energy Legacy Pairing Re-evaluated

Security Advisory
Re-evaluating LE Legacy Pairing, we realized that customers could miss to set two security keys (ER + IR) to persistent random values, which

Read More

Recent Posts

  • Ezurio’s Vela IF820 Repurposed: A Step-by-Step BTstack Development Board Setup
  • LE Audio on ESP32
  • Simplifying GATT Client Implementations
  •  True Wireless Stereo with LE Audio
  • USB Adapter for Intel Bluetooth/Wifi M.2 Cards

Categories

  • Audio (4)
    • Classic Audio (2)
    • LE Audio (2)
  • Bluetooth Profiles (2)
  • Development Tools (8)
    • Breakout Boards (2)
    • Packet Logger (2)
    • PTS Testing Equipment (4)
  • Ports (8)
    • Hardware Abstraction (3)
    • STM32 Port (4)
  • Security Advisory (7)

RSS Feed

  • Entries RSS
© Copyright 2017 by BlueKitchen GmbH.   Design based on a Themeum theme.